CVE-2025-70149
Published: 18 February 2026
Summary
CVE-2025-70149 is a critical-severity SQL Injection (CWE-89) vulnerability in Codeastro Membership Management System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and error handling of untrusted inputs like the ID parameter at web interfaces.
Requires timely identification and remediation of the specific SQL injection flaw in print_membership_card.php.
Enables detection of SQL injection vulnerabilities like CVE-2025-70149 through regular vulnerability scanning of web applications.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated network exploitation of a public-facing web application component via SQL injection.
NVD Description
CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.
Deeper analysisAI
CVE-2025-70149 is a SQL injection vulnerability (CWE-89) in CodeAstro Membership Management System version 1.0, specifically affecting the print_membership_card.php component through the ID parameter. This critical flaw, assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), was published on 2026-02-18T17:21:36.160.
The vulnerability can be exploited by any unauthenticated attacker with network access, requiring low attack complexity and no user interaction. Exploitation enables high-impact compromise of confidentiality, integrity, and availability, allowing arbitrary SQL query execution to potentially extract, modify, or delete sensitive data from the underlying database.
Advisories and further details are available in the provided references, including the vendor product page at https://www.phpscriptsonline.com/product/membership-management-software and a technical analysis at https://youngkevinn.github.io/posts/CVE-2025-70149-Membership-SQLi/.
Details
- CWE(s)